Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03OGh4LWdwNmctN21qNs4AA6LJ

Memory leaks in code encrypting and verifying RSA payloads

Using crafted public RSA keys which are not compliant with SP 800-56B can cause a small memory leak when encrypting and verifying payloads.

An attacker can leverage this flaw to gradually erode available memory to the point where the host crashes for lack of resources. Upon restart the attacker would have to begin again, but nevertheless there is the potential to deny service.

Permalink: https://github.com/advisories/GHSA-78hx-gp6g-7mj6
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03OGh4LWdwNmctN21qNs4AA6LJ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 9 months ago
Updated: about 1 month ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-78hx-gp6g-7mj6, CVE-2024-1394
References: Repository: https://github.com/golang-fips/openssl
Blast Radius: 0.0

Affected Packages

go:github.com/microsoft/go-crypto-openssl/openssl
Affected Version Ranges: <= 0.2.8
Fixed in: 0.2.9
go:github.com/golang-fips/openssl/v2
Dependent packages: 1
Dependent repositories: 0
Downloads:
Affected Version Ranges: <= 2.0.0
Fixed in: 2.0.1
All affected versions: 2.0.0
All unaffected versions: 2.0.1, 2.0.2, 2.0.3
go:github.com/microsoft/go-crypto-openssl
Dependent packages: 1
Dependent repositories: 1
Downloads:
Affected Version Ranges: <= 0.2.8
No known fixed version
All affected versions: 0.1.0, 0.1.1, 0.1.2, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.2.6, 0.2.7, 0.2.8
go:github.com/golang-fips/go
Dependent packages: 0
Dependent repositories: 0
Downloads:
Affected Version Ranges: <= 1.22.1
No known fixed version
All affected versions: